Google has already unwillingly confirmed that it’s going to unveil Android M at its I/O 2015 conference next week, and a few reports now claim to have knowledge of one of the major features that are going to be available to Android M users in the near future. DON’T MISS: Key iPhone 6s specs seemingly detailed in new report According to independent reports from BuzzFeed and ArsTechnica, Android M might be finally getting native support for fingerprint authentication. “The new functionality will allow users to log in to all of the supported applications on their Android devices without entering a password,” BuzzFeed has learned from its sources. Other details about the fingerprint functionality or Android M have not been shared.
In case you happen to have one or multiple adult dating website profiles, you might consider securing them right away, as one of the world’s largest such websites has been hit by hackers. The attackers managed to steal highly sensitive personal data for four million users, leaking them online in spreadsheet format. DON’T MISS: Key iPhone 6s specs seemingly detailed in new report According to Channel 4, the dating site in question is Adult FriendFinder which has more than 63 million global users. In addition to usual personal data including usernames, email addresses, dates of birth and addresses, the stolen data also contains more sensitive information regarding the user’s sexual orientation and preferences, and whether they’re looking for extramarital affairs
Germany's Audi will enhance connected-car services in China to meet growing demand for driver-assistance systems and driverless technology in the world's largest auto market. Volkswagen's flagship luxury brand said on Friday it will jointly develop navigation map data, positioning algorithms and point-of-interest functions with China's web services provider Baidu. Chinese Internet companies and auto makers have been quick to team up to start developing partly self-driving and Internet-connected cars, following a path already trodden by U.S. tech giants Google Inc and Apple Inc. "We are now taking our next big step in China," Chief Executive Rupert Stadler said at the carmaker's annual shareholder meeting in Neckarsulm, Germany.
Once again, we have to tip our cap in grudging admiration for the lengths the National Security Administration will go to hack into our mobile devices. The Intercept has published some new documents leaked by Edward Snowden that show how the NSA and other spy agencies at one point planned to conduct man-in-the-middle attacks between end users and Android app stores to infect users’ phones with spyware. FROM EARLIER: Here are the most ridiculous questions al-Qaeda asks on its official job application “The agencies used the Internet spying system XKEYSCORE to identify smartphone traffic flowing across Internet cables and then to track down smartphone connections to app marketplace servers operated by Samsung and Google,” writes The Intercept. “As part of a pilot project codenamed
NEW YORK (AP) — Hewlett-Packard is selling a controlling stake in its China server and storage unit, a move that comes as the Chinese government, apparently worried about U.S. cyberspying, has encouraged the use of local companies.
With the advent of mobile devices, odds are pretty high that most people these days don’t pay attention to airline safety videos. Delta, however, is out to change that with a new Internet-meme themed video that splices together your standard flight safety instructions with an avalanche of Internet memes, both new and old. To top it all off, the video even features a few cameos worth keeping an eye out for. DON’T MISS: One simple trick could free up gigabytes of space on your iPhone While there are innumerable Internet memes to choose from, Delta did a good job picking some of the more recognizable ones when putting this video together. If this becomes the default safety video on Delta flights, well,
(This story refiles the May 20 story to change "fund" to "find" in paragraph 13) By Joseph Menn SAN FRANCISCO (Reuters) - The U.S. Commerce Department proposed new export controls Wednesday that would treat unknown software flaws as potential weapons, a move aimed at reducing the security industry’s aid to rival nations. The regulations are broadly written and cover what are known as “zero-day” flaws, or security vulnerabilities that the software vendors do not know about. Hackers and defense contractors often sell information about such flaws to government agencies or the maker of the software, and internal U.S. sales could continue.
By Nidal al-Mughrabi GAZA (Reuters) - With jobs scarce and time on their hands, some tech-savvy Gazans have found a new way to make money - hacking Internet-based phone lines and routing international calls for a fee. Voice Over Internet Protocol (VoIP) hacking has been a phenomenon for years. There are various ways of hacking VoIP networks, but people familiar with the practice in Gaza say it involves using dedicated servers to scoop up as many telephone IP addresses as possible, especially from big corporations and businesses.
By Fumbuka Ng'wanakilala DAR ES SALAAM (Reuters) - Tanzanian President Jakaya Kikwete said on Thursday that Western donors are setting degrading conditions for aid to the east African nation and he could be forced in time to tell them: "keep your aid". Tanzania, one of Africa's biggest per capita aid recipients, has experienced repeated delays in payments due to donor concerns about corruption, poor governance and the slow pace of reforms. ...
By Andrea Shalal WASHINGTON (Reuters) - The U.S. Navy is working hard to improve the cyber security of its computer networks and weapon and communications systems, while bracing for potential attacks on power grids and fuel supplies, Navy Secretary Ray Mabus said Wednesday. Mabus said cyber warfare was a clear threat given Russia's use of cyber attacks before its physical invasions of Crimea and Georgia. It's in every system because we are so networked." Mabus confirmed recent media reports that the Navy was looking at replacing IBM servers used for its Aegis combat system after International Business Machines Corp's $2.1 billion sale of its server division to China's Lenovo Group Ltd last year.
• CareFirst says cyberattack stole data of 1.1 million users in U.S (May 22, 2015)
• Panel OKs $51B for Justice, NASA over Democratic protests (May 22, 2015)
• Interpol seeks ways to dismantle foreign fighter networks (May 22, 2015)
• Top US regulators warn of new threats to financial system (May 22, 2015)
• This is the smartphone Google’s next Nexus phone might be based on (May 22, 2015)
• Unknown hackers attack German parliament's data network (May 22, 2015)
• Hackers attack German Parliament's internal data system (May 22, 2015)
• Limit ball carry and use more par-threes: Jacklin (May 22, 2015)
• Golf-Limit ball carry and use more par-threes - Jacklin (May 22, 2015)